Preferred Language
Articles
/
bsj-6142
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 02 2025
Journal Name
Applied Computing And Informatics
WisdomModel: convert data into wisdom
...Show More Authors

Scopus (3)
Scopus
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Jul 06 2014
Journal Name
Journal Of Educational And Psychological Researches
The influence of Online Training Courses on Iraqi EFL Instructors Teaching and Learning Process
...Show More Authors

For over a decade, educational technology has been used sparingly in our schools and universities. Online training courses have been used since 2003 to fill the gaps in our learning system and to add extra program besides classroom learning. This paper aims to investigate the Iraqi EFL instructors’ participating in online training courses and its influence on the process of teaching and learning.

       The sample of present study consists of 30 instructors from University of Baghdad. The questionnaire of sixteen items was constructed. After ensuring validity and reliability of questionnaire, it was applied on March 2013 and the result shows that most of instructors improve their teaching methods b

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
Ieee Transactions On Information Forensics And Security
Opportunistic Scheduling for Average Secrecy Rate Enhancement in Fading Downlink Channel With Potential Eavesdroppers
...Show More Authors

View Publication
Scopus (23)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Impact of Porous Media on Peristaltic Transport of Tangent Hyperbolic Nanofluid in Asymmetric Channel
...Show More Authors

The purpose behind this paper is to discuss nanoparticles effect, porous media, radiation and heat source/sink parameter on hyperbolic tangent nanofluid of peristaltic flow in a channel type that is asymmetric. Under a long wavelength and the approaches of low Reynolds number, the governing nanofluid equations are first formulated and then simplified. Associated nonlinear differential equations will be obtained after making these approximations. Then the concentration of nanoparticle exact solution, temperature distribution, stream function, and pressure gradient will be calculated. Eventually, the obtained results will be illustrated graphically via MATHEMATICA software.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Parametric Study of Mixed Convective Radiative Heat Transfer in an Inclined Annulus
...Show More Authors

The steady state laminar mixed convection and radiation through inclined rectangular duct with an interior circular tube is investigated numerically for a thermally and hydrodynamicaly fully developed flow. The two heat transfer mechanisms of convection and radiation are treated independently and simultaneously. The governing equations which used are continuity, momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function and the Body Fitted Coordinates (B.F.C) methods. The finite difference approach with the Line Successive Over-Relaxation (LSOR) method is used to obtain all the computational results. The (B.F.C) method is used to generate the grid of the problem. A computer program (Fortr

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
CUSTOM ANALYSIS THROUGH Nth ORDER GAUSSIAN NOISE
...Show More Authors

Scopus
Publication Date
Thu Jan 01 2009
Journal Name
Iraqi Journal Of Physics
Resonance Tunneling Through GaN/AlGaN Superlattice System
...Show More Authors

The purpose of our work is to report a theoretical study of electrons tunneling through semiconductor superlattice (SSL). The (SSL) that we have considered is (GaN/AlGaN) system within the energy range of ε < Vo, ε = Vo and ε > Vo, where Vo is the potential barrier height. The transmission coefficient (TN) was determined using the transfer matrix method. The resonant energies are obtained from the T (E) relation. From such system, we obtained two allowed quasi-levels energy bands for ε < VO and one band for ε  VO.

View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
COMMUNICATION SKILLS THROUGH THE LANGUAGE OF SPEECH
...Show More Authors

Language is the realistic and sensitive basis for any communication between two or more parties. It is an important workshop that prepares meanings and coding them according to a linguistic structure governed by agreed rules that speak to and coexist with everyone.

Whereas the forms of communication are: personal, mediator and mass, none of them can move away from language in their dealings and communication patterns. Since each has its own characteristics and skills, it must be launched in its fields through verbal and non-verbal symbols and wears the elements of influential language as intended.

It makes the recipient face two things: whether he fails to understand those symbols hence its purpose fail, or he meditates s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
Resonance Tunneling Through GaN/AlGaN Superlattice System
...Show More Authors

The purpose of our work is to report a theoretical study of electrons tunneling through semiconductor superlattice (SSL). The (SSL) that we have considered is (GaN/AlGaN) system within the energy range of ε < Vo, ε = Vo and ε > Vo, where Vo is the potential barrier height. The transmission coefficient (TN) was determined using the transfer matrix method. The resonant energies are obtained from the T (E) relation. From such system, we obtained two allowed quasi-levels energy bands for ε < VO and one band for ε  VO.

View Publication Preview PDF